MURDER, POLITICS, AND THE END OF THE JAZZ AGE
by Michael Wolraich
Order today at Barnes & Noble / Amazon / Books-A-Million / Bookshop
MURDER, POLITICS, AND THE END OF THE JAZZ AGE by Michael Wolraich Order today at Barnes & Noble / Amazon / Books-A-Million / Bookshop |
By Aaron Blake, Barton Gellman and Greg Miller, Washington Post, June 9, 6:20 PM
A 29-year-old former undercover CIA employee said Sunday that he was the principal source of recent disclosures about top-secret National Security Agency programs, exposing himself to possible prosecution in an acknowledgment that had little if any precedent in the long history of U.S. intelligence leaks.
Edward Snowden, a tech specialist who has also contracted for the NSA and works for the consulting firm Booz Allen Hamilton, unmasked himself as a source after a string of stories in The Washington Post and the Guardian that detailed previously unknown U.S. surveillance programs. He said he disclosed secret documents in response to what he described as the systematic surveillance of innocent citizens.
In an interview Sunday, Snowden said he is willing to face the consequences of exposure.“I’m not going to hide,” Snowden told The Post from Hong Kong [....]
“This is significant on a number of fronts: the scope, the range. It’s major, it’s major,” said John Rizzo, a former general counsel of the CIA who worked at the agency for decades. “And then to have him out himself . . . I can’t think of any previous leak case involving a CIA officer where the officer raised his hand and said, ‘I’m the guy.’ ” [....]
Comments
This is fascinating.
I wonder why the system doesn't track high-security individuals who suddenly start making calls to reporters.
(A fix that may already be underway.) :^(
by erica20 on Mon, 06/10/2013 - 2:47am
WaPo/Gellman vs. Guardian/Greenwald stuff going on:
by artappraiser on Mon, 06/10/2013 - 1:00pm
Daniel Ellsberg @ The Guardian: Edward Snowden: saving us from the United Stasi of America
by artappraiser on Mon, 06/10/2013 - 1:19pm
by artappraiser on Mon, 06/10/2013 - 2:04pm
John Cassidy: A hero; Jeffrey Toobin: No hero.
by artappraiser on Mon, 06/10/2013 - 8:22pm
One reason why a "conversation" was needed explained, my bold (and notably, different reasoning from Ellsberg's above, who emphasizes, among other things, the FISA court) :
by artappraiser on Mon, 06/10/2013 - 1:49pm
Jane Mayer with similar, from NewYorker.com, June 6: What's the Matter with Metadata?:
....according to the mathematician and former Sun Microsystems engineer Susan Landau"....The public doesn’t understand,” she told me, speaking about so-called metadata. “It’s much more intrusive than content....
by artappraiser on Mon, 06/10/2013 - 1:52pm
Yeah, the funny thing is, if they snooped my calls or blogs, someone would have to listen to my ideas, and maybe I'd create another Snowden.
Instead they just machine-wise cross-correlate all the info about you from every angle, put you in a behavior box, autogenerate some trend liines, and boom, they have your suspicious activiity labled if they need it and all the background tracing if they need court evidence, check who your friends, family & acquaintances are if they need some help pressuring someone to confess or cooperate, and can autopop up a warrant request if they have to to go to rubberstamp FISA for some actual filler for one of their content boxes (on stuff that's not already public).
Over several years of blogging, I've often been fairly careful to not give too much of my personal detail, exactly where I'm from, exactly where I live - as much because I just don't like it to influence impressions of what I . But I'm sure a good big data program that will of course scarf up my few hundred diaries & 20,000 comments and piece together likely details, plus note my access IPs, cross-correlate them with every other email I have, every other blog or social site I've ever been on, pattern search all the content of any public postings, whoever angry or ironic it might be over 20 years, see if anything triggers an autoresponse, figure out who are people like me & who I know, where I've worked & gone to school and lived and talked to, etc., etc, etc.
by PeraclesPlease on Tue, 06/11/2013 - 1:14am
I hear they call the BIG Daddy computer, 'Edgar' and that the company saying is, 'Suck it up like a Hoover''. But really, in the real world, what is to worry about, what could go wrong? And besides, if you're not doing anything wrong ... ... ...
by A Guy Called LULU on Tue, 06/11/2013 - 3:06am
Ask me if I've ever done anything right.
by PeraclesPlease on Tue, 06/11/2013 - 9:49am
by artappraiser on Mon, 06/10/2013 - 1:57pm
The WaPo changed the wording of its original story The government had to request access from the companies. This is vastly different than the government having direct access.
by rmrd0000 on Mon, 06/10/2013 - 4:37pm
It does appear that Congress was briefed.
by rmrd0000 on Mon, 06/10/2013 - 5:46pm
Prism and the metadata program are not one and the same, see above @ 1:45. Prism is subject to FISA.
On the request point, I have seen it stated that Twitter refused, though I haven't really checked much about that out. (Strikes me offhand as kind of ironic, because most Twitter users, in this country at least, aren't looking for anonymity, but for more people to follow their tweets from their phones.)
Thanks for adding to the thread.
by artappraiser on Mon, 06/10/2013 - 8:15pm
Metadata appears to be regarded in a manner similar to trash left out on the curb. The data is no longer your property.
by rmrd0000 on Mon, 06/10/2013 - 8:19pm
Just like having a private eye tail you wherever you go 24x7 taking notes, recording your conversations - hey, you're in public, why should it matter? You said it out loud, why shouldn't someone/everyone listen?
by PeraclesPlease on Tue, 06/11/2013 - 1:17am
How the leaks went down:
Cryptic Overtures and a Clandestine Meeting Gave Birth to a Blockbuster Story,
by Charlie Savage and Mark Mazzetti @ New York Times, June 10, 2013
by artappraiser on Tue, 06/11/2013 - 2:17pm
from
N.S.A. Leaker Vows to Fight Extradition From Hong Kong
By Keith Bradsher, New York Times, June 12, 2013
with much more on the legal details therein (Bradsher does have excellent connections/sources in both Hong Kong and China, mho.)
by artappraiser on Wed, 06/12/2013 - 5:19pm
Occurs to me that bringing up U.S. hacking of Hong Kong targets in the interview with the South China Morning Post may be an attempt to affect the above government proceedings/procedures.
by artappraiser on Wed, 06/12/2013 - 5:33pm
"The Falcon" speaks his thoughts to a CNN reporter,
and
NYT's Keith Bradsher, working overtime in Hong Kong , getting a lot of conflicting answers from people who ought to know wassup....
by artappraiser on Sat, 06/15/2013 - 12:52am
He was on the job at Booz only 4 weeks, then took the unpaid medical leave of absence, and when he did not come back from that, the Feds did go looking for him, from Mark Rosenball @ Reuters:
Noted this conflict:
So does that mean he was saying that a systems administrator geek like him could hack the database without authorization? Probably not, because he uses the words "had the authority." Hosenball's sources are implying a Systems Administrator does not have that authority.
by artappraiser on Sat, 06/15/2013 - 6:09pm
Ever since hearing that statement by Snowden I have assumed that he misspoke when he used the word "authority". I think he must have meant that he had the ability. Surely he didn't have the authority to choose, on his own volition, to eavesdrop on the President's communications even if the system made it possible.
I think that is what he was saying, that his position made it possible to access anything in the data base with, but also obviously without, authorization.
by A Guy Called LULU on Sat, 06/15/2013 - 9:10pm
Surely he didn't have the authority to choose, on his own volition, to eavesdrop on the President's communications even if the system made it possible.
Good point. So it remains unclear what he meant by that....
by artappraiser on Sat, 06/15/2013 - 9:26pm
They talked about the access problem in the Guardian chat today. Sounds to me like he is claiming that the system was set up lousy as to security of privacy rights and therefore 1) is invaded without good authority all the time "by accident" and 2) when "warrants" are involved they are not much more than just rubber stamped forms:
@ 11:27 am and @ 11:40am
Question:
Answer:
Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content?
by artappraiser on Mon, 06/17/2013 - 3:43pm
He explains more @ 11:55 am, about the problem with the filters:
Question:
Answer:
by artappraiser on Mon, 06/17/2013 - 3:50pm